Trust-based dynamic authorization model for pervasive computing

被引:0
|
作者
Guo, Yajun [1 ]
Wang, Liang [1 ]
Hong, Fan [2 ]
Han, Lansheng [2 ]
机构
[1] Department of Computer Science, Huazhong Normal University, Wuhan 430079, China
[2] College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
关键词
8;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:70 / 73
相关论文
共 50 条
  • [31] Psychological Dimensions in Trust-Based Models in Cloud Computing
    AlShammari, Maha M.
    2020 19TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS ENGINEERING AND SCIENCE (DCABES 2020), 2020, : 87 - 91
  • [32] Review of Trust-based File Sharing in Cloud Computing
    Canedo, Edna Dias
    Albuquerque, Robson de Oliveira
    de Sousa Junior, Rafael Timoteo
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN MESH NETWORKS (MESH 2011), 2011, : 44 - 50
  • [33] Trust-based security architecture for Ubiquitous Computing systems
    Hung, Le Xuan
    Giang, Pho Duc
    Zhung, Yonil
    Van Phuong, Tran
    Lee, Sungyoung
    Lee, Young-Koo
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 753 - 754
  • [34] A trust-based resource selection algorithm in Cloud Computing
    Liu, Xinran, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18):
  • [35] Dynamic Authorization of Grid Based on Trust Mechanism
    Niu, Rui-ping
    Mu, Xiao-fang
    Sun, Gao-feng
    WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 360 - +
  • [36] Proof of Trust: Mechanism of Trust Degree Based on Dynamic Authorization
    Huang J.-H.
    Xia X.
    Li Z.-C.
    Li J.-H.
    Zheng H.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (09): : 2593 - 2607
  • [37] A Trust-Based Situation Awareness Model
    Aydogan, Reyhan
    Sharpanskykh, Alexei
    Lo, Julia
    MULTI-AGENT SYSTEMS (EUMAS 2014), 2015, 8953 : 19 - 34
  • [38] A Trust-Based News Spreading Model
    Carchiolo, V.
    Longheu, A.
    Malgeri, M.
    Mangioni, G.
    Previti, M.
    COMPLEX NETWORKS IX, 2018, : 303 - 310
  • [39] A nonmonotonic modal authorization logic for pervasive computing
    Noorollahi, Ali
    Fallah, Mehran S.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1077 - 1091
  • [40] An authorization and access control scheme for pervasive computing
    Staffans, LA
    Saridakis, T
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2004, : 726 - 733